|Publication number||US7197550 B2|
|Application number||US 09/938,443|
|Publication date||Mar 27, 2007|
|Filing date||Aug 23, 2001|
|Priority date||Aug 23, 2001|
|Also published as||US20030041136|
|Publication number||09938443, 938443, US 7197550 B2, US 7197550B2, US-B2-7197550, US7197550 B2, US7197550B2|
|Inventors||Douglas A. Cheline, Michael Ma, Ye Zhang, Lester J. Chong|
|Original Assignee||The Directv Group, Inc.|
|Export Citation||BiBTeX, EndNote, RefMan|
|Patent Citations (40), Non-Patent Citations (3), Referenced by (52), Classifications (21), Legal Events (3)|
|External Links: USPTO, USPTO Assignment, Espacenet|
The present invention relates generally to communication networks, and particularly to a Virtual Private Network (VPN) system and a computer implemented method for remotely configuring the VPN between a client-side system and a server-side system.
Communication networks can generally be characterized as either private or public networks. In pure private networks, communications between multiple computers, located at different locations, occur via a permanent or switched network, such as a telephone network. The communicating computers typically connect directly to each other via a dialup or leased line connection, thereby emulating their physical attachment to one another. This type of network is usually considered private because the communication signals travel directly from one computer to another.
Communication over packet networks, such as the Internet, is typically not private, as the network cannot guarantee packet delivery. Such networks allow packets to be injected into, or ejected out of, their circuits indiscriminately, and/or analyzed while in transit. For normal communication this poses no real threat. However, to keep sensitive data communicated on such circuits private, the packets flowing on the circuit must be encrypted so that injected packets can be recognized and discarded to keep unauthorized parties from reading and analyzing data. These private circuits are called “tunnels.”
A virtual private network (VPN) is a private data network that makes use of tunnels to maintain privacy when communicating over a public telecommunication infrastructure, such as the Internet. The purpose of VPNs is to give server operators, such as corporations, the same capabilities that they would have if they had a private permanent or switched network. VPNs also cost much less to operate than other private networks, as they use a shared public infrastructure rather than a private one.
Data communicated on a VPN is encrypted before being sent through the public network and decrypted at the receiving end. An additional level of security involves encrypting not only the data but also the originating and receiving network addresses. Server operators today are looking at using VPNs for both extranets and wide-area intranets.
Setting up a VPN, however, is a complex task. Corporations providing VPN connectivity to their employees, typically, must go through a number of inefficient steps before a VPN network can be established between the server operator's server and an employee's client computer. First, the server operator must set up the individual's account on the server-side. To accomplish this, a VPN system administrator at the server-side, manually enters the configuration data for the new client, determines the necessary security settings, inputs the security settings into an authentication server, and configures the server-side firewall so that it will accept incoming packets from the new client. Second, the VPN system administrator has to configure the client-side by manually entering the configuration data for the new server, determining the necessary security settings, inputting the security settings, and configuring the client-side firewall so that it will accept incoming packets from the new server. No known current means exists for automatically configuring the client and server for VPN communication.
Another drawback with current systems that establish VPN communication between a client and a server, is that they typically do not allow multiple clients coupled to the same client-side modem to establish multiple VPN communication tunnels over the same modem. For example, say husband (H) telecommutes with his office (OH) using VPN over his Digital Subscriber Line (DSL) modem in his home. Wife (W) would also like to telecommute with her office (OW) a corporation distinct from OH. The standard means for establishing two VPN tunnels is to provide separate modems and telephone lines to ensure that the communication between H and OH and W and OW, remains secure and private. This system is both inefficient and costly as two sets of client-side modems, two telephone lines, and two separate Internet connections are required. A need therefore exists for a means to allow multiple clients to establish multiple VPN tunnels over the same client-side modem.
Yet another drawback with existing VPN systems is that of host name resolution. Users using a file manager, such as WINDOWS EXPLORER™, or an Internet browser, such as MICROSOFT'S INTERNET EXPLORER™, in conjunction with more recent versions of MICROSOFT WINDOWS™, can enter a string of text into a text box on the Graphical User Interface (GUI) of these applications. Depending on the particular application used, this text box may be called, among other things, a destination field, location field, address field, or URL field. Typically, users enter Uniform Resource Locators (URLs) into the text box. However, a folder or directory name anywhere on the network that the client computer is connected to, may also be entered into the text box. In fact, any string of text may be entered into the text box. A URL is a compact string representation for a resource that is available on the Internet. In general, a URL is written as follows:
[<scheme>:<scheme-specific-part>]. The <scheme> portion of the URL identifies which scheme is being utilized. Among the better known schemes are File Transfer Protocol (FTP), Hypertext Transfer Protocol (HTTP), the Gopher Protocol, Wide Area Information Servers (WAIS), USENET News Protocol (News), and the Prospero Directory Service (Prospero). Once the string of text has been entered into the address field and either the “enter” key depressed or the “Go” button clicked, the local client computer attempts to resolve what to display.
If the text entered is a URL, i.e., prefixed by ftp://, http://, www, etc., the client computer first searches its local cache to see if Web content, such as a Web page, associated with the URL is present on the local client computer. If it is, the associated Web content is displayed to the user. If it is not, the client computer sends out a DNS request to a DNS server dictated by the user's Internet settings, where the DNS (Domain Name System) resolves Internet domain names, such as www.company.com, into IP (Internet Protocol) addresses, such as 220.127.116.11. A DNS list of domain names and IP addresses are distributed throughout the Internet in a hierarchy of authority.
The DNS server then searches its DNS tables to locate an IP address associated with the URL. If an IP address is located, the IP address is returned to the local computer which then sends a request for the Web page (or other content, such as a file) to that IP address. If an associated IP address is not found on the DNS server, the DNS server returns a “page not found” response to the client computer.
If the text entered is a directory or folder name on the client computer, or within the network that the client computer forms a part of, and if such a directory or folder name is located, the contents of that folder or directory is displayed. If the text entered is not a directory or folder name on the client computer, or within the network that the client computer forms a part of, the text is sent to a designated search engine which conducts a search of the Internet using the text as the search term. A most likely Web page and/or a list of results located is subsequently displayed to the user. A description of this process can be found in U.S. Pat. No. 6,009,459, which is incorporated herein by reference. Selection of the search engine, most likely Web page, and the list of results is controlled by the manufacturer of the application and cannot be altered by the user.
The above mentioned text entry system works sufficiently well for a single client computer connected to the Internet. However, when using a VPN, multiple DNS servers and/or folders or directories with the same name, may coexist on the VPN. Therefore, the client computer, or its modem, has no way of intelligently determining which cache to search, which DNS server to send the request to, which search engine to use, and/or which directory or folder's contents to display. A need, therefore, exists to manage and prioritize requests entered into the text box of the above mentioned applications.
In light of the above, a less complex, less efficient, and less costly method for configuring a VPN would be highly desirable. Particularly where the resources of a service provider can be redirected to areas other than manually configuring the system. Furthermore, a VPN system that allows multiple clients coupled to the same client-side modem to establish multiple VPN communication tunnels over the same modem, would also be desirable. In addition, any advancement in host name resolution that addresses the abovementioned drawbacks would be welcomed.
According to the invention there is also provided a remotely configurable Virtual Private Network (VPN). The VPN preferably includes a client-side network, a server-side network, and a service provider network. The client-side network preferably includes a DSL (Digital Subscriber Line) modem that communicates with the Internet, and at least one client computer electrically coupled to the modem. The server-side network preferably includes a VPN concentrator communicates with the Internet, and at least one server electrically coupled to the VPN concentrator. The service provider network preferably includes a security generator for determining security settings used to secure VPN communication between the client computer and the server, a VPN synchronizer for automatically configuring the modem with the security settings, and a modem synchronizer for configuring the modem with the security settings.
Further according to the invention there is provided a computer implemented method for remotely configuring a Virtual Private Network (VPN) between a client-side system and a server-side system. Data is received by a service provider that is indicative of a selected server-side system and a selected client-side system between which a VPN is to be established. This data is preferably supplied by a VPN administrator via an administration Website. Security settings are then automatically determined for the client-side system based at least partially on the data. The security settings preferably include public and private keys and/or a Digital Certificate. VPN configuration details, including the security settings, are then automatically transmitted to the client-side system. The client side system them uses the configuration details to automatically configure itself to establish a secure VPN tunnel between the server-side system and itself. VPN configuration details may also be automatically transmitted to a VPN concentrator within the server-side system. A Virtual Private Network tunnel is subsequently established between the client-side system and the server-side system, and the tunnel's operation verified. A computer program product for configuring a VPN system is also provided.
Using the above, a less complex, less efficient, and less costly method for configuring a VPN is provided, thereby allowing the resources of a service provider to be redirected to areas other than manually configuring the system.
Additional objects and features of the invention will be more readily apparent from the following detailed description and appended claims when taken in conjunction with the drawings, in which:
Like reference numerals refer to corresponding parts throughout the several views of the drawings.
The VPN disclosed herein makes use of a public telecommunication infrastructure and maintains secure communication through the use of encrypted tunneling protocol and security procedures. From the user's perspective, the connection appears to be a private network connecting the user's computer to a server operator's server-side system despite the fact that all communication is occurring over the public telecommunication infrastructure.
A preferred VPN meets the following general requirements for network security and access control. Information transferred over the VPN is encrypted with strong encryption algorithms, thereby ensuring confidentiality. An unauthorized party without the knowledge of the sending and receiving parties cannot secretly modify the transferred information, thus safeguarding the integrity of the communication. Furthermore, before information is transferred between parties, both sides need to authenticate themselves to each other by using Digital Certificates. Additionally, a home user will only be able to access the VPN and transfer or receive information from the server operator system after the user provides a username, password and optionally a tokencode and is authenticated by the server operator's authentication server.
Furthermore, the VPN system disclosed herein is relatively easy for telecommuting users to install and maintain, as the client VPN software resides on the user's modem instead of on the user's client computer. This alleviates drawbacks associated with software interoperability and maintenance issues on the user's client computer. Also, server operator VPN system administrators can securely connect to easy to use web interfaces to manage their entire VPN system.
The client-side system 108 is preferably operated by one or more users who desire to connect to the server-side system 130 via a VPN. The server-side system is preferably operated by a server operator, such that the user can connect or telecommute via a VPN with the server-side system 130 as if he or she was locally connected to it. A service provider preferably operates and controls the VPN and the service provider system 146. It should be understood that the service provider, user, and server operator may be distinct individuals, a group of individuals, a legal entity, or the like. Furthermore, although in practice, the service provider, the user, and/or the server operator are separate entities, this is not required.
The client-side system 108 preferably comprises one or more client computers 102(1 )–(N) coupled together to form a local area network or LAN 104. Client computers 102 include any type of computing device, such as a personal computer, handheld computer, or the like. The LAN 104 is coupled to a modem 106 that in turn couples to a service provider managed network 114 and the Internet 116. In the preferred embodiment, the modem 106 is a DSL (Digital Subscriber Line) modem that couples to a Digital Subscriber Line Access Multiplexer (DSLAM) 112, which is a network device that is usually located at a telephone server operator's central office 110. The DSL modem 106 preferably couples to the DSLAM 112 over regular telephone lines [POTS (plain old telephone service) lines]. The DSLAM 112, in turn, couples to the service provider managed network 114 and the Internet 116 in a manner well understood in the art. The service provider managed network 114 is preferably an ATM (Asynchronous Transfer Mode) network. It should be understood that DSL technology is only one way of connecting to the Internet 116. DSL technology is used for its speed of communication and accessibility to users' homes over regular telephone lines. In alternative embodiments of the invention, cable modem technology, satellite technology, or the like may be utilized as long as the modem described is used.
The service provider managed network 114 also couples to the service provider system 146. The service provider system 146 preferably comprises a service provider's DNS server 120, a VPN Provider 118, and an HTTP (Web) server 160 containing administration HTTP (Web) pages 162, an example of which is shown in
The VPN Provider 118 is an important part of the VPN infrastructure. Based on commands and information entered into administration Web pages 162 by remote corporate VPN system administrators, the VPN Provider 118 dispatches instructions to configure and control the modem 106 and a VPN concentrator 136 (described below) and manage their security policies. The VPN concentrator 136 is a device that combines several communications channels into one and is often used to tie multiple terminals together into one line. The VPN Provider 118 also transmits certificate and private keys from a security generator, such as a Public Key Infrastructure (PKI) synchronizer 124, where keys are numeric codes that are combined in some manner with communicated data to encrypt it for security purposes. The corporate administration Web-pages 162 are preferably unique for each server operator and only allow administration of VPN concentrators 136 resident at the server-side system locations 130, and users that access such server-side systems 130.
The VPN Provider 118 is preferably coupled to an OSS (Operational Support System) 122, a Public Key Infrastructure (PKI) synchronizer 124, a VPN synchronizer 126, a Value Added Network Services (VANS) database 128, and a modem synchronizer or cache farm 148. In addition to its usual functions, the OSS 122, also, preferably controls online ordering and billing of VPN services.
Although PKI is preferably used to secure the communications, any suitable alternative security mechanism may be used. PKI enables users of an unsecured public network, such as the Internet, to securely and privately exchange data through the use of public and private cryptographic key pairs that are obtained and shared through a trusted authority. PKI provides for Digital Certificates that can identify individuals or organizations. A Digital Certificate is an electronic “credit card” that establishes a sender's credentials. It is issued by a certification authority (CA) 150, and contains the senders name, a serial number, expiration dates, a copy of the certificate holder's public key (used for encrypting and decrypting messages and digital signatures), and the digital signature of the certificate-issuing authority so that a recipient can verify that the certificate is real. The PKI synchronizer 124 consists of: a certificate authority (CA) 150 that issues and verifies Digital Certificates, where each certificate includes the public key or information about the public key; a registration authority (RA) 152 that acts as the verifier for the CA before a Digital Certificate is issued to a user; and one or more directories 154 where the certificates (with their public keys) are held. Although not shown, a certificate management system may also be provided.
As the Root CA the PKI processes PEM (Privacy Enhanced Mail) encoded PKCS #10 (Public-Key Cryptography System) Digital Certificate requests and return Certificates in the PKCS #7 format, where the Root CA is the parent authority that all CAs trust. As an additional function the PKI generates private and public key pairs. The public key is used for certificate creation, while the private key, once it has been sent to and received by the modem, is deleted from the PKI. The PKI requires an API (Application Program Interface) that can be called by the VPN Provider to control the PKI functions such as process a certificate request, etc. The PKI also needs to support revoking certificates with a minimum of issuing CRL's (Certificate Revocation List).
The VPN Synchronizer 126 is used to serve security data via the VPN provider to the VPN Concentrator 136, while the modem synchronizer or cache farm 148 is used to serve security data via the VPN provider to the modem 106.
The VANS database 128, provides the features that allow management of the entire VPN. The VANS database contains the security policies and certificates for the modem 106 and the VPN Concentrators 136. For example, for each pair of client-server VPN tunnels set up, a security policy for each modem and each VPN Concentrator 136 is stored in the VANS database 128. The VANS database preferably contains server location information, network information, or the like. The network information preferably includes DNS server 144 addresses, authentication server 138 addresses, WINS (Windows Internet Naming Service) server IP addresses, default corporate network subnets, encryption and authentication algorithms, user's configuration information (locations, additional corporate subnets allowed to connect to), or the like.
The server-side system 130 preferably consists of a router 132 coupled to a firewall 134 and a VPN concentrator 136. The firewall 134 and VPN concentrator 136 are coupled to a local area network or LAN 156. The LAN 156 couples an authentication server 138, a file server 140, a proxy server 142, and the server operator's DNS server 144 to one another.
The router 132 is a device or, in some cases, software in a computer, that determines the next network point to which a packet should be forwarded toward its destination. The router 132 is coupled to at least two networks, namely the Internet 116 and the LAN 156, and decides which way to send information packets based on its current understanding of the state of the networks it is connected to.
The firewall 134 is a set of related programs located at the server-side system 130, that protects the resources of the LAN 156 from users connected to the Internet 116. The firewall 134 also works with the proxy server 142 to make network requests on behalf of corporate workstation users (not shown). The firewall is preferably installed on a computer separate from the rest of the LAN 156 so that no incoming request can access private network resources. Alternatively, the firewall 134 may form part of another computer, such as the router 132 or VPN Concentrator 136. There are a number of firewall screening methods that may be used in conjunction with the invention. One such method is to screen requests to make sure they come from acceptable (previously identified) IP addresses. In the present invention, the firewall 134 allows remote access to the private LAN 156 by the use of secure logon procedures and authentication certificates, explained below.
In use, a VPN tunnel is constructed between the modem 106 and the VPN concentrator 136, which acts as a server and responds to VPN session requests. In the preferred embodiment of the invention, the VPN concentrator 136 conforms to IETF IKE (Internet Engineering Task Force—Internet Key Encryption) and IPSec (Internet Protocol Security) standards and provides as a minimum DES (Data Encryption Standard) and/or 3DES (Triple Data Encryption Standard (168 Bit)) encryption and HMAC-MD5 (Hashed Message Authentication Code-Message Digest 5) and/or HMAC-SHA1 (Hashed Message Authentication Code-Secure Hash Algorithm 1) authentication algorithms. The VPN concentrator also preferably supports multiple concurrent IPSec tunnels and is fully compatible with authentication and encryption software, such as the HIFN IKE and IPSec Toolkits 238 that are shown and described in relation
The authentication server 138 is used to authenticate a VPN session request from the modem 106. In the preferred embodiment of this invention, the authentication server 138 is a RADIUS (Remote Authentication Dial-In User Service) server. RADIUS is client/server protocol and software that enables clients to remotely communicate with a central server that authenticates users and authorizes their access to the requested system or service. RADIUS allows a server operator to maintain user profiles in a central database, preferably on the authentication server 138, that all remote servers can share. RADIUS also provides enhanced security, allowing a server operator to set up a policy that can be applied at a single administered network point. Having a central service also means that it is easier to track usage for billing and for keeping network statistics. RADIUS client software is preferably also located on the modem 106, such that data packets sent by the modem 106 are RADIUS formatted. An example of suitable RADIUS software is “Funk Steel Belted RADIUS™” made by FUNK SOFTWARE™, Inc.
The file server 140 is used to serve files requested by a user to a client computer 102. The proxy server 142 is a server that acts as an intermediary between the LAN 156 and the Internet so that the server operator can ensure security, administrative control, and caching service. One function of the proxy server 142 is to accept securely formatted packets (preferably RADIUS formatted packets) from the modem's security software 226 (
In a preferred embodiment the proxy server uses open source software, such as CISTRON RADIUS SERVER VERSION 1.6.3™, and is modified to accept RADIUS packets from client computers 102 without client configuration. Optionally, OEM Radius software (Funk Steel Belted Radius™) which can operate in promiscuous mode, can be used that has the additional advantage of having the capability of authenticating against a MICROSOFT NT™ Domain or NOVELL NDS™. Promiscuous mode is the condition in which a node in a network recognizes and accepts all packets on the line regardless of protocol type or destination. Use of the server operator's DNS server 144 will be explained in detail below in relation to
It should be appreciated that the functions of the various devices shown in
Communication procedures 216 are used for communicating with the service provider system 146 (
The security procedures 226 enable the client computers 102 (
Network Address Translation (NAT) 228 is used to translate Internet Protocol addresses (IP addresses) used within one network, preferably the LAN 104 (
Therefore, the VPN effectively extends the server-side system 130 (
The DHCP server 230 lets network administrators manage centrally and automate the assignment of Internet Protocol (IP) addresses to the client computers 102 (
The DNS (Domain Name System) relay procedures 232 allows the user's client computer 102 (
The flash memory 234 is a type of constantly-powered nonvolatile memory that can be erased and reprogrammed in units of memory called blocks. In the preferred embodiment of the invention, the following is stored in the flash memory 234: The Root CA Certificate, Sub CA Certificate, EW Certificate (Use for connecting to all server-side systems), EW Private Key, EW Password, VPN Security Policy (One set for every server operator, each user may connect to several server operators in different locations which the modem will be allowed to connect to), Cached Log information, and Login/Status Web page.
The cache 236 is a temporary storage memory. The HIFN™ provided IKE/IPSec Toolkit 238 and HIFN™ provided X.509v3 Digital Certificate management 240 are software products provided by HI/FN, Inc.™, which are used to implement IPSEC (Internet Protocol Security) and IKE (Internet Key Encryption).
Turning now to the configuration of the VPN system between a server operator 130 and a remote user 108. The server operator firstly enters into an agreement for DSL service, including VPN, from a service provider 146. A VPN concentrator 136 (
Moreover, the modem is preferably configured to send and receive data traffic directly to and from the Internet, while only server operator side data traffic is sent and received through the VPN tunnel. If a modem does not have this feature, all data traffic must first be sent through the VPN tunnel to the server operator, and thereafter the data traffic destined for the Internet passed through the server operator network firewall.
The VPN provider 118 (
The selected corporate servers, users, and security settings are then stored (step 324) in the VANS database 128 (
To synchronize (step 340) the security settings with the modem, the modem preferably downloads a set of VANS Product URLs, which are pointers to the real security settings. The VPN Product URLs include a download VPN configuration URL, a download modem firewall configuration URL, a renew and download modem PKI certificates URL, and a report VPN operational test result URL. The modem connects to the VPN URLs, authenticates using the cached one time password, and downloads the VPN configuration from the VANS database 128 (
The user is then instructed (step 346), preferably via a Web page, to reboot the client computer. The user then reboots (step 348) the client computer and the modem. The modem, for each VPN Security Policy, then preferably performs an operational test where a VPN tunnel is created (step 350) and the internal port of the VPN Concentrator 136 (
The above described method addresses the manual configuration drawbacks associated with current VPNs, as it is less complex, more efficient, and less costly than current VPN systems. In addition, the resources of service providers can be redirected to areas other than manually configuring the system. Using the above described method, VPN service providers can eliminate sending out technicians to server operators and users to configure their systems. This leads to tremendous cost savings for the service provider and the server operator. Further benefits can be brought about by allowing multiple users to establish distinct VPNs using the same modem. These further benefits are described below in relation to
In the preferred embodiment, configuration of the security settings occurs using standard IPSec implementation. The IPSec stack is configured with the server operator server's VPN Security Policy (VPN Concentrator IP address, authentication method, IKE and IPSec authentication and encryption algorithms, Diffie-Hellman Group, key lifetime). The security procedures 226 (
Subsequently, the security procedures 226 (
If access is rejected (step 426—Yes) then a Web page, from the stored Web pages 222 (
If access is accepted (step 430—Yes), then a VPN tunnel is established (step 432) between the client having the stored IP or MAC address and the server-side system. This is preferably accomplished by adding routes from the connecting client to the corporate subnets through a virtual interface. If split-tunneling is not allowed then the routes to the Internet are removed and the default route is set to the VPN Concentrator. Login details are stored in a log file, which is periodically pushed to the VANS database 128 (
After a successful authentication, firewall rules are added to the packet filtering firewall 218 (
If no traffic is detected for a length of time defined by the VPN system administrator, there is a system timeout (step 434), the tunnel is torn down and a disconnect message is displayed, where the user has the option to re-log on (step 438). The user may, also, at any point, choose to log out (step 436) of the VPN. Again the user is given the option to re-log on (step 438). If the user decides not to re-log on, he or she is logged out of the system (step 440). In this way security is protected by dropping the VPN should the user not be using the VPN for a predetermined length of time. Therefore, if a user forgets to disconnect from the VPN and leaves the client computer unsecured, the VPN will automatically be dropped after a length of time determined by the VPN system administrator.
Should other users, using any of the remainder of the client computers 102 (
Security mechanisms used in a preferred embodiment of the invention may be generally described as follows:
The above described method addresses the difficulties associated with establishing multiple VPNs over a single modem, leading to tremendous cost and efficiency benefits. Two separate modems connecting to the Internet using separate DSL connections is no longer required. Further cost and efficiency benefits can be attained by addressing the difficulties associated with resolving host names in a VPN. These further benefits are described below in relation to
With VPNs, the problem arises as to which DNS server the client computer communicates with, to resolve host names. The DNS Relay procedures 232 (
To accomplish the above, the user's client computer DNS server settings, usually accessible from the Browser, are set to the internal IP address of the modem. Once a user requests a host, such as by typing “www.company.com” into the text or address box of his Internet browser, the client computer 102 (
If the modem locates the host in the cache (step 508—Yes), the located host address is returned (step 512) to the client computer, which receives (step 542) the host address. Alternatively, if a cached version of the requested page is located, the page itself will be returned to the client computer and displayed to the user. If a host address is returned (step 512) to the client computer, then the client computer formulates a new request for content, and sends (step 544) it to the host address. The request is preferably a HyperText Markup Language (HTML) request for content such as a Web page or file.
If the host is not located in the cache (step 508—No), the host query is transmitted to all DNS servers set up in the modem. In the preferred embodiment, the host query is transmitted (step 514) to the server operator's DNS Server 144 (
If the server operator's DNS server locates (step 526—Yes) the host's associated address, the address is returned (step 542) to the modem. If the server operator's DNS server does not locate (step 526—No) the host's associated address, the server operator's DNS server transmits (step 546) a “No Host Found” message to the modem.
Likewise, if the service provider's DNS server locates (step 528—Yes) the host's associated address, the address is returned (step 530) to the modem. If the service provider's DNS server does not locate (step 528—No) the host's associated address, the service provider's DNS server transmits (step 546) a “No Host Found” message to the modem.
Once the modem acquires (steps 532 and 534) the address from the service provider's DNS server and/or the server operator's DNS server, the modem determines (step 536) whether it has received more than one address, i.e., an address from both the service provider's DNS server and the server operator's DNS server. If only one address is received (step 536—No), then the address is returned (step 540) to the client computer. If more than one address is received (step 536—Yes), then the modem applies (step 538) a policy to the received addresses, so as to be left with only a single address. In the preferred embodiment the policy keeps only the most recent address. Alternatively, the policy may always return the address supplied by the service provider. Once the policy has been applied and only one address remains, that address is returned (step 540) to the client computer.
Once the client computer receives (step 542) the address, it formulates a request for content, such as an HTML request for a Web page, and sends (step 544) the request to the received address. Therefore, if for example a host request for “www.company.com” returns a request from both the service provider's and the server operator's DNS servers, the policy preferably returns either the latest IP address for “www.company.com” or returns the IP address from the service provider's DNS server, such as 18.104.22.168. The client computer then sends a request to 22.214.171.124, which returns the company's Web page. The above method, therefore, resolves host names in a VPN with multiple DNS servers.
The above method may also be used by the service provider to control the use of the search engine, most likely page, and results list returned when a user enters text into the text box that cannot be resolved. If neither of the DNS servers can resolve the host name, they transmit (step 546) a “No Host Found” message to the modem. The modem receives (step 548) the message and instructs a search engine dictated by the service provider, or alternatively by the VPN system administrator, to conduct a search based on the unlocated host name. Once the search (step 550) is completed, the search results are transmitted (step 552) to the client computer. Once the client computer receives (step 554) the results, they are displayed (556) to the user. In this way, the service provider and/orVPN system administrator can control the search results displayed to the user. For example, the VPN system administrator can set up the system so that when text is entered into the text box by a user, and no host address can be resolved from the text, the results of a search of the server operator's web site, using the text as the search term, can be displayed to the user. Furthermore, the service provider can generate revenue from displaying advertiser's Web pages more prominently on a list of search results. In an alternative embodiment, if the DNS servers do not respond at all, or do not respond within a predetermined time, the modem automatically conducts the search.
Moreover, the above method may also be used to resolve host addresses for devices coupled to the VPN. Users using a file manager, such as WINDOWS EXPLORER™, or an Internet browser, such as MICROSOFT'S INTERNET EXPLORER™, in conjunction with more recent versions of MICROSOFT WINDOWS™, can resolve the host name of devices, or directories on these devices, coupled to the VPN. For example, if the host query entered into the text box of the GUIs of the above applications was for “ComputerName” the modem would attempt to locate a device, or directories on a device, that matched the entered name. The modem would send the host name to both DNS servers and if a device, or directories on a device, on the VPN matches “ComputerName,” return the address of that device.
The above described method addresses the drawbacks associated with current DNS systems, while allowing a service provider to specify which search engine is to be used if a name cannot be resolved.
For each user the administrator can enable 614, suspend 616, or delete 618 VPN service. Also, for each user the administrator can select organization configuration (may belong to multiple organizations) and for each organization enter IP address to use, list additional network subnets allowed to connect to, specify security level used (set of IKE and IPSec Authentication and Encryption algorithms, Diffie-Hellman key size, etc.), specify split tunneling (On/Off).
A status box 612 is provided where the administrator can view the connection status, who the VPN Concentrator is connected to, the last connection time, the total usage, the bytes transferred, the time on-line, the encryption/authentication algorithms used, certificate information, or the like
The administrator can also preferably add new server operator details by clicking on button 620. New details may include a VPN Concentrator IP address, a VPN Concentrator type, a secondary VPN Concentrator IP address, a secondary VPN Concentrator type, a Radius Server IP address, a secondary Radius Server IP address, the security level encryption/authentication, a Radius Shared Secret, a list of network subnets allowed to connect to, or the like.
In the case where a user reports a lost or stolen modem, the VPN administrator can notify the service provider of the loss, preferably through the administrator Web-site. This causes NRMS (Network Resource Management System) on the OSS to revoke the modem's certificates, disable VPN service for this modem, and delete the modem's policy configuration on the VPN Concentrator. Because of the nature of a DSL connection, and because the modem interoperates with the NMS and with it's saved configuration, the modem can only be operated from the user's phone line, and, therefore, cannot be used to connect to the corporate network from another DSL phone line.
The above methods provide a VPN service which fulfills the requirements of network security and access control, while from the user and administrator's perspective is very easy to install, configure and manage.
While the foregoing description and drawings represent the preferred embodiment of the present invention, it will be understood that various additions, modifications and substitutions may be made therein without departing from the spirit and scope of the present invention as defined in the accompanying claims. In particular, it will be clear to those skilled in the art that the present invention may be embodied in other specific forms, structures, arrangements, proportions, and with other elements, materials, and components, without departing from the spirit or essential characteristics thereof. The presently disclosed embodiments are therefore to be considered in all respects as illustrative and not restrictive, the scope of the invention being indicated by the appended claims, and not limited to the foregoing description. Furthermore, it should be noted that the order in which the process is performed may vary without substantially altering the outcome of the process.
|Cited Patent||Filing date||Publication date||Applicant||Title|
|US4200770||Sep 6, 1977||Apr 29, 1980||Stanford University||Cryptographic apparatus and method|
|US5307402 *||Apr 16, 1992||Apr 26, 1994||Exxon Research And Engineering Company||Reduced time remote access method|
|US5777989||Dec 19, 1995||Jul 7, 1998||International Business Machines Corporation||TCP/IP host name resolution for machines on several domains|
|US5794230||Jun 28, 1996||Aug 11, 1998||Microsoft Corporation||Method and system for creating and searching directories on a server|
|US6009459||Jan 10, 1997||Dec 28, 1999||Microsoft Corporation||Intelligent automatic searching for resources in a distributed environment|
|US6108330||Sep 26, 1997||Aug 22, 2000||3Com Corporation||Apparatus and methods for use therein for an ISDN LAN modem that selects among a plurality of DNS servers for responding to a DNS query|
|US6118768||Sep 26, 1997||Sep 12, 2000||3Com Corporation||Apparatus and methods for use therein for an ISDN LAN modem utilizing browser-based configuration with adaptation of network parameters|
|US6145003||Dec 17, 1997||Nov 7, 2000||Microsoft Corporation||Method of web crawling utilizing address mapping|
|US6298308||Jan 5, 2000||Oct 2, 2001||Reid Asset Management Company||Diagnostic network with automated proactive local experts|
|US6377571||Apr 23, 1998||Apr 23, 2002||3Com Corporation||Virtual modem for dialout clients in virtual private network|
|US6523027 *||Jul 30, 1999||Feb 18, 2003||Accenture Llp||Interfacing servers in a Java based e-commerce architecture|
|US6538996 *||Apr 25, 2000||Mar 25, 2003||Enterasys Networks, Inc.||Remote computer communication|
|US6560634||Aug 13, 1998||May 6, 2003||Verisign, Inc.||Method of determining unavailability of an internet domain name|
|US6601233 *||Jul 30, 1999||Jul 29, 2003||Accenture Llp||Business components framework|
|US6609128 *||Jul 30, 1999||Aug 19, 2003||Accenture Llp||Codes table framework design in an E-commerce architecture|
|US6609153 *||Dec 24, 1998||Aug 19, 2003||Redback Networks Inc.||Domain isolation through virtual network machines|
|US6633878 *||Jul 30, 1999||Oct 14, 2003||Accenture Llp||Initializing an ecommerce database framework|
|US6662221 *||Apr 11, 2000||Dec 9, 2003||Lucent Technologies Inc.||Integrated network and service management with automated flow through configuration and provisioning of virtual private networks|
|US6671729 *||Jun 15, 2000||Dec 30, 2003||Lockheed Martin Corporation||Autonomously established secure and persistent internet connection and autonomously reestablished without user intervention that connection if it lost|
|US6704873 *||Jul 30, 1999||Mar 9, 2004||Accenture Llp||Secure gateway interconnection in an e-commerce based environment|
|US6711138 *||Sep 30, 1999||Mar 23, 2004||Conexant Systems, Inc.||Digital subscriber line/home phoneline network router|
|US6718535 *||Jul 30, 1999||Apr 6, 2004||Accenture Llp||System, method and article of manufacture for an activity framework design in an e-commerce based environment|
|US6760746||Aug 31, 2000||Jul 6, 2004||Eric Schneider||Method, product, and apparatus for processing a data request|
|US6765591 *||Apr 2, 1999||Jul 20, 2004||Nortel Networks Limited||Managing a virtual private network|
|US6765881 *||Dec 6, 2000||Jul 20, 2004||Covad Communications Group, Inc.||Virtual L2TP/VPN tunnel network and spanning tree-based method for discovery of L2TP/VPN tunnels and other layer-2 services|
|US6871347||Apr 13, 2001||Mar 22, 2005||Interland, Inc.||Method and apparatus for facilitating load balancing across name servers|
|US20010036192 *||Mar 19, 2001||Nov 1, 2001||Chiles David Clyde||Home-networking|
|US20020010798||Feb 16, 2001||Jan 24, 2002||Israel Ben-Shaul||Differentiated content and application delivery via internet|
|US20020026503 *||Apr 11, 2001||Feb 28, 2002||Samuel Bendinelli||Methods and system for providing network services using at least one processor interfacing a base network|
|US20020027915||May 11, 2001||Mar 7, 2002||George Foti||System and method for address resolution in internet protocol (IP) -based networks|
|US20020032544||Sep 5, 2001||Mar 14, 2002||Reid Alan J.||Diagnostic network with automated proactive local experts|
|US20020118671 *||Jul 12, 2001||Aug 29, 2002||Data Race, Inc.||Extending office telephony and network data services to a remote client through the internet|
|US20020154623||Apr 20, 2001||Oct 24, 2002||Hank Hundemer||Provision of digital data via multiple broadcasts|
|US20020169988||May 14, 2001||Nov 14, 2002||Vandergeest Ron J.||Method and apparatus for providing user authentication using a back channel|
|US20020178361 *||May 24, 2001||Nov 28, 2002||International Business Machines Corporation||System and method for dynamically determining CRL locations and access methods|
|US20030009592||Jul 5, 2001||Jan 9, 2003||Paul Stahura||Method and system for providing static addresses for Internet connected devices even if the underlying address is dynamic|
|US20030014541||Jul 13, 2001||Jan 16, 2003||Yuri Poeluev||Method and apparatus for resolving a web site address when connected with a virtual private network (VPN)|
|US20030039268||Aug 14, 2001||Feb 27, 2003||Chong Lester J.||System and method for provisioning broadband service in a PPPoE network using a list of stored domain names|
|US20040039798||Jun 18, 2003||Feb 26, 2004||Ultradns, Inc.||Domain name resolution system and method|
|US20040123153 *||Apr 11, 2003||Jun 24, 2004||Michael Wright||Administration of protection of data accessible by a mobile device|
|1||*||Author Unknown; "Lucent Security Management Server: Carrier-Grade IP Services Management Solution"; Lucent Technologies; Published May 2001.|
|2||Kangasharju et al.; "A Replicated Architecture for the Domain Name System"; Mar. 2000; INFOCOM 2000; Nineteenth Annual Joint Conference of the IEEE Computer and Communications Societies Proceedings; vol. 2; pp. 660-669.|
|3||Microsoft; Windows 2000 DNS White Paper; Oct. 1999.|
|Citing Patent||Filing date||Publication date||Applicant||Title|
|US7535856 *||Jun 1, 2005||May 19, 2009||Cisco Technology, Inc.||Techniques for zero touch provisioning of edge nodes for a virtual private network|
|US7653746 *||Aug 1, 2003||Jan 26, 2010||University Of Southern California||Routable network subnet relocation systems and methods|
|US7743406 *||Dec 21, 2004||Jun 22, 2010||International Business Machines Corporation||System and method of preventing alteration of data on a wireless device|
|US7761551 *||Oct 22, 2007||Jul 20, 2010||Trumpf Laser Gmbh + Co. Kg||System and method for secure remote access|
|US7769037||Jun 6, 2005||Aug 3, 2010||Cisco Technology, Inc.||Techniques for using first sign of life at edge nodes for a virtual private network|
|US7778199||Jun 2, 2005||Aug 17, 2010||Cisco Technology, Inc.||Techniques for customer self-provisioning of edge nodes for a virtual private network|
|US7792995||Sep 23, 2008||Sep 7, 2010||International Business Machines Corporation||Accessing data processing systems behind a NAT enabled network|
|US7808901||Nov 10, 2008||Oct 5, 2010||Broadcom Corporation||Media processing system based on satellite set top box platform with telephony downstream and upstream data paths|
|US8028093||Sep 30, 2003||Sep 27, 2011||Broadcom Corporation||Media processing system supporting adaptive digital media parameters based on end-user viewing capabilities|
|US8059527||Nov 16, 2005||Nov 15, 2011||Cisco Technology, Inc.||Techniques for oversubscribing edge nodes for virtual private networks|
|US8064357 *||Feb 6, 2006||Nov 22, 2011||At&T Intellectual Property I, L.P.||Methods, DSL modems, and computer program products for provisioning DSL service using downloaded username/password|
|US8086749||Dec 16, 2008||Dec 27, 2011||Cisco Technology, Inc.||Techniques for migrating a point to point protocol to a protocol for an access network|
|US8176530||Oct 19, 2010||May 8, 2012||Broadcom Corporation||Preventing a non-head end based service provider from sending media to a media processing system|
|US8325733||Sep 7, 2010||Dec 4, 2012||Exafer Ltd||Method and system for layer 2 manipulator and forwarder|
|US8495180 *||Sep 30, 2003||Jul 23, 2013||Broadcom Corporation||Server architecture supporting a personal media exchange network|
|US8516257||Sep 13, 2011||Aug 20, 2013||Broadcom Corporation||Secure media peripheral association in a media exchange network|
|US8661489||Aug 16, 2011||Feb 25, 2014||Broadcom Corporation||Media processing system supporting adaptive digital media parameters based on end-user viewing capabilities|
|US8819845||Apr 5, 2012||Aug 26, 2014||Broadcom Corporation||Preventing a non-head end based service provider from sending media to a media processing system|
|US8863257 *||Mar 10, 2011||Oct 14, 2014||Red Hat, Inc.||Securely connecting virtual machines in a public cloud to corporate resource|
|US8893186||Oct 5, 2010||Nov 18, 2014||Broadcom Corporation||Media processing system based on satellite set top box platform with telephony downstream and upstream data paths|
|US8925076||Dec 11, 2012||Dec 30, 2014||Kaspersky Lab Zao||Application-specific re-adjustment of computer security settings|
|US8971335||Jun 30, 2010||Mar 3, 2015||Exafer Ltd||System and method for creating a transitive optimized flow path|
|US8972547 *||Oct 18, 2007||Mar 3, 2015||International Business Machines Corporation||Method and apparatus for dynamically configuring virtual internet protocol addresses|
|US9037750 *||Oct 18, 2007||May 19, 2015||Qualcomm Incorporated||Methods and apparatus for data exchange in peer to peer communications|
|US9357256||Sep 30, 2003||May 31, 2016||Broadcom Corporation||Third party media channel access in a media exchange network|
|US9548963||Apr 1, 2014||Jan 17, 2017||At&T Intellectual Property I, L.P.||Method and system to enable a virtual private network client|
|US20040034695 *||Aug 1, 2003||Feb 19, 2004||University Of Southern California||Network subnet relocation|
|US20040117834 *||Sep 30, 2003||Jun 17, 2004||Jeyhan Karaoguz||Server architecture supporting a personal media exchange network|
|US20040139190 *||Jan 15, 2003||Jul 15, 2004||Kreger Kevin Scott||A private http based system for diagnosis, control and monitoring of an imaging system controller|
|US20040215761 *||Feb 5, 2004||Oct 28, 2004||Yasuki Fujii||Network management system|
|US20040221154 *||May 2, 2003||Nov 4, 2004||Sudhir Aggarwal||Mobile security architecture|
|US20050125689 *||Sep 17, 2004||Jun 9, 2005||Domonic Snyder||Processing device security management and configuration system and user interface|
|US20060133612 *||Dec 21, 2004||Jun 22, 2006||Abedi Scott S||System and method of preventing alteration of data on a wireless device|
|US20060187855 *||Jun 2, 2005||Aug 24, 2006||Cisco Technology, Inc.||Techniques for customer self-provisioning of edge nodes for a virtual private network|
|US20060187856 *||Jun 6, 2005||Aug 24, 2006||Cisco Technology, Inc.||Techniques for using first sign of life at edge nodes for a virtual private network|
|US20060187937 *||Nov 16, 2005||Aug 24, 2006||Cisco Technology, Inc.||Techniques for oversubscribing edge nodes for virtual private networks|
|US20060190570 *||Jun 1, 2005||Aug 24, 2006||Cisco Technology, Inc.||Techniques for zero touch provisioning of edge nodes for a virtual private network|
|US20070011735 *||Jul 6, 2005||Jan 11, 2007||Cable Television Laboratories, Inc.||Open standard conditional access system|
|US20070162748 *||Jan 5, 2007||Jul 12, 2007||Masataka Okayama||Apparatus for Encrypted Communication on Network|
|US20070186113 *||Feb 6, 2006||Aug 9, 2007||Cuberson Russel D||Methods, DSL modems, and computer program products for provisioning DSL service using downloaded username/password|
|US20080091794 *||Oct 22, 2007||Apr 17, 2008||Trumpf Laser Gmbh + Co. Kg||System and method for secure remote access|
|US20090016369 *||Sep 23, 2008||Jan 15, 2009||International Business Machines Corporation||Accessing data processing systems behind a nat enabled network|
|US20090019183 *||Oct 18, 2007||Jan 15, 2009||Qualcomm Incorporated||Methods and apparatus for data exchange in peer to peer communications|
|US20090106404 *||Oct 18, 2007||Apr 23, 2009||Christenson David A||Method and Apparatus for Dynamically Configuring Virtual Internet Protocol Addresses|
|US20090138928 *||Nov 10, 2008||May 28, 2009||Broadcom Corporation||Media processing system based on satellite set top box platform with telephony downstream and upstream data paths|
|US20090154466 *||Dec 16, 2008||Jun 18, 2009||Cisco Technology, Inc.||Techniques for Migrating a Point to Point Protocol to a Protocol for an Access Network|
|US20090288147 *||Mar 10, 2009||Nov 19, 2009||Michael Yeung||System and method for modifying security functions of an associated document processing device|
|US20110002240 *||Jun 30, 2010||Jan 6, 2011||Amir Harel||System and method for creating a transitive optimzed flow path|
|US20110058549 *||Sep 7, 2010||Mar 10, 2011||Amir Harel||Method and system for layer 2 manipulator and forwarder|
|US20110113460 *||Oct 5, 2010||May 12, 2011||Broadcom Corporation||Media Processing System Based on Satellite Set Top Box Platform with Telephony Downstream and Upstream Data Paths|
|US20120233678 *||Mar 10, 2011||Sep 13, 2012||Red Hat, Inc.||Securely and automatically connecting virtual machines in a public cloud to corporate resource|
|US20130013739 *||Mar 22, 2011||Jan 10, 2013||Jean-Luc Grimault||DNS Server, Gateways and Methods for Managing an Identifier of a Port Range in the Transmission of Data|
|U.S. Classification||709/223, 370/252, 379/93.01, 709/220|
|International Classification||H04L29/06, H04L29/08, G06F15/16|
|Cooperative Classification||H04L69/329, H04L67/34, H04L67/14, H04L63/0272, H04L63/102, H04L29/06, H04L63/0823, H04L63/0838, H04L63/20, H04L63/18|
|European Classification||H04L63/02C, H04L29/08N13, H04L29/06, H04L29/08N33|
|Aug 23, 2001||AS||Assignment|
Owner name: HUGHES ELECTRONICS CORPORATION, CALIFORNIA
Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNORS:CHELINE, DOUGLAS A.;MA, MICHAEL;ZHANG, YE;AND OTHERS;REEL/FRAME:012122/0272;SIGNING DATES FROM 20010820 TO 20010821
|Sep 27, 2010||FPAY||Fee payment|
Year of fee payment: 4
|Sep 29, 2014||FPAY||Fee payment|
Year of fee payment: 8